Last week, TOC reported the alleged purchase of “weaponised German surveillance malware” by a Singapore company, as revealed in a Wikileaks media release on 15 September.

The Singapore company which is said to have purchased the products is apparently PCS Security Pte Ltd, which was incorporated in 1998 by two Singaporeans, and is now headed by five Singaporeans with $2 million dollars of paid up capital.

TOC understands that this private company is wholly owned by Phoenix Co-operation Society Ltd, but more information is publicly unavailable on the co-op except that it was granted a statutory exemption from the Government under the Co-operative Societies Act.

This bestowed full administrative powers on the president of Phoenix, unlike other co-operatives.

Till date, there has been no response from the contact person listed for Phoenix Co-operative Society Ltd on who exactly is the president of co-operative.

On its website, PCS says it prides itself “in delivering value-added systems with our domain expertise and experience in Homeland Security and Infocomm Security.”

“We have the expertise and capability to deliver cutting-edge technology solutions for our Customers in the Government, trade and the commercial sector,” it said.

TOC has sent repeated queries to PCS Security on the accusations of the company purchasing the surveillance malware by Wikileaks since last week , but the company has yet to respond.

While TOC investigates further on PCS Security Ltd, let’s look at the capability of the malware and items said to be purchased by PCS.  

In the information released by Wikileaks, the licences purchased by PCS Security Pte Ltd from Finfisher are FinSpy, FinIntrusion, FinUSB Suite and FinUSB.

FinSpy is described by the software company as a field-proven remote monitoring solution that allows monitoring of mobile and security-aware targets that regularly change location, use encrypted and anonymous communication channels and travel inter-nationally.

When FinSpy is installed on a computer system, the surveillance system can be remotely controlled and accessed as soon as it is connected to the Internet, no matter where in the world the system is located.

However, users will need to obtain FinSpy licenses from Finfisher as information is routed through Finfisher’s server before reaching the users’ terminal.

From the information provided by Wikileaks, it is surmised that PCS purchased licenses to monitor up to 500 targets in 2012.

The FinFly USB provides an easy-to-use and reliable way of installing Remote Monitoring Solutions on computer systems when physical access is available to the agents.

Once the FinFly USB is inserted into a computer, it automatically installs the configured software with little or no user-interaction and does not require IT-trained agents when being used in operations. The FinFly USB can be used against multiple systems before being returned to the agent’s headquarters.

FinIntrusion Kit described as an up-to-date and covert operational kit that can be used for most common IT intru­sion operations in defensive and offensive areas.

The kit comes as a portable covert tactical unit that includes many common IT intrusion devices, all necessary adapters and antennas which can be used with the purchased malware.

FinUSB Suite is a flexible product that enables law enforcement agencies to quickly and securely extract forensic information from computer systems without the requirement of IT trained agents.

The suite consists of a headquarter notebook and ten encrypted USB dongles. They look just like any common USB stick and are easy to use, as they are pre-programmed to search exactly the data that is needed. The user interface makes it easy to configure the dongle’s operational options and to decrypt and analyse the gathered data.

FinFisher malware is said to be able to operate under all major desktop and mobile operating systems, namely Windows, OS X, Linux, Android, iOS, BlackBerry, Symbian, and Windows Mobile.

TOC asked a local network administrator, Chong Kai Xiong, about his thoughts on this surveillance system.

“FinFisher is extremely intrusive, much more so than the average spyware. It runs on every platform imaginable and collects literally everything there is to collect on infected devices. Contact lists, emails, chat messages, webcam videos, screenshots, keystrokes, you name it.
“In this information age where many people live out their lives online, the use of FinFisher against anyone is a criminal breach of privacy.
“And like all forms of malware, FinFisher requires software exploits or plain deception for delivery to the target person’s device(s). This raises a whole host of other legal and ethical issues.”

TOC sent emails to the Attorney General Chambers last week about the legality of such software and the act of hacking into one’s computer using such software but we have yet to receive any replies from them.

Subscribe
Notify of
6 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
You May Also Like

【国会】国会领袖英兰妮期待国会有更多元、激烈辩论

国会领袖英兰妮,于今日在国会说明国会反对党领袖职责。 她期待反对党议员扮演更重要角色,期待国会应有更多元和激烈的辩论,但应确保这种多元性不导致国家或人民两极分化。 英兰妮也是总理公署部长兼财政部和国家发展部第二部长。她重申,理应有建设地采纳这些多元化观点,使之能为国人服务。 7月28日,国会议长和国会领袖办公室已发文告,阐述国会反对党领袖的职责和权益。工人党党魁、阿裕尼集选区议员毕丹星,获委国会反对党领袖。 毕丹星有权率先针对部长或政策、提案提出质问,也获赋予长达40分钟的更长发言时间,和政治职务者相同,在国会也有自己的办公室。 反对党领袖除了要领导反对党议员,在国会辩论提出替代观点、监督政府等,也包括履行职务如出席正式官方活动、随同政府和公共服务官员进行访问和参加会议。

【国会】共住20万客工 杨莉明:大型宿舍疫情大致稳定

迄今为止,本地43个大型客工宿舍,共容纳20万客工;9万5000名客工住在1200座工厂改造宿舍、2万客工住在建筑工地临时住处。 同时,7万名来自建筑领域的工作准证和S准证持有者,安顿在组屋或私人公寓。 人力部长杨莉明在国会指出,目前43座大型客工宿舍内的疫情“大致稳定”。他指在大部分宿舍,都有对客工进行积极检测,以便隔离和治疗确诊客工,阻断病毒传播。 “大部分客工都健康良好,那些确诊者也在康复中。至于这些努力仍需时才能显现完整成果。” 义顺集选区议员黄国光在国会询问人力部长,过去五年,住在上述各类住宿的客工人数各有多少。 杨莉明称,人力部官员经常检查哪些有执照的宿舍,以确保他们遵守《外籍雇员宿舍法》。仅在去年,该部进行3000次调查, 并检举多达1200名雇主。 杨莉明指出,新加坡需准备迈入下个阶段,即把复原做好。这包括建设设施和安顿康复客工在适合的住处,以减少复发感染的风险。 她指政府将拟定新策略来监督客工的健康,其中包括提供血氧饱和仪(用以侦测冠病)并要求员工定期检测。 她也表示我国也必须计划可持续性的医疗支援系统,例如透过远程治疗及时为不适客工问诊。    

Is the HDB profiteering from flat owners’ woes?

During this economic downturn, HDB should freeze its compulsory acquisition of HDB flats. Leong Sze Hian.

汤申东海岸线第一阶段 预计明年1月底投入运作

经过六年建设,汤申—东海岸地铁线(TEL)第一阶段,预计将在明年1月底,华人农历新年前正式投入运作。 交通部长许文远,是在今早到汤东线万礼车厂视察,在致词时透露,汤东线第一阶段的工程已大致完成。 第一阶段将涵括三个新加坡北部地铁站-兀兰北(Woodlands North)、兀兰(Woodlands)和兀兰南(Woodlands South)。 该阶段路线原定于今年底开放,不过许文远透露,陆交局和业者SMRT会在今年12月学校假期,为该阶段展开详细的测试。同时,也为周围居民举办预览活动。 该路线信号系统由法国公司阿尔斯通(Alstom)开发,目前已投入测试。 许文远称,汤申—东海岸地铁线开放首数日将免费载客,让通勤民众熟悉乘搭和转站路线。 上述全长43公里的地铁线,预料将在2024年全面完成,共32站,将由SMRT公司运营。 许文远说,该路线在2013年动工时,当时的部长是吕德耀。到2024年时,可能部长也换人了,自己届时可能仅以乘客身份搭乘该地铁,此言似乎已有所指。